]]>By: Tom (amindfv)http://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10472
Sat, 16 Jun 2012 13:14:42 +0000http://changelog.complete.org/?p=7535#comment-10472@Andreas: that’s not right. For all creative works in the U.S. the default (if you write no notice) is copyright ownership by the author.
]]>By: ZERUCHhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10447
Tue, 12 Jun 2012 16:59:11 +0000http://changelog.complete.org/?p=7535#comment-10447Ironically, I found this blog post looking into the very thing its about. I got a similar email just today and I found it…not right.

Thanks for helping confirm my suspicions.

]]>By: Andreashttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10439
Thu, 31 May 2012 10:25:47 +0000http://changelog.complete.org/?p=7535#comment-10439Lacking expertness in licensing-issues, I would guess that if you do not license your blog-posts at all, the default is that they are in the public domain, so everyone can do whatever they like with your content legally.
]]>By: John Goerzenhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10420
Wed, 16 May 2012 20:11:37 +0000http://changelog.complete.org/?p=7535#comment-10420It is a cool idea, but the problem is that it isn’t a “fire and forget” sort of solution. If I have to keep putting time into it every so often, it’s not going to work out too well for me.
]]>By: mehttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10419
Wed, 16 May 2012 20:01:49 +0000http://changelog.complete.org/?p=7535#comment-10419I really like @nobody’s solution. If you find an IP overlap, you could implement a system where those IPs get tons of p0rrn and other non-safe content when they access your website. This way, they will probably be excluded from most Google (and other) searches by the “safety filter”. This will reduce their visibility to ther Internet, totally making their plans fail :)
]]>By: Justin Duggerhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10416
Wed, 16 May 2012 07:16:19 +0000http://changelog.complete.org/?p=7535#comment-10416I figure there’s not much you can do to stop the copying if you want to keep publishing RSS. So instead, you just abuse it. How many of those copy farms are altering your links? By simply referring to previous posts in your new posts, you might end up with a dozen copycat sites linking to yours.

We did get an odd spam the other day. It claimed to be someone trying to get off google’s spam list, and pointed out that one of our hosted project’s trac was full of spam links. But a) it didn’t link to them and b) the author’s homepage was clearly spam. I guess it worked from a ‘get clicks’ perspective but wtf.

]]>By: Alan Knowleshttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10415
Wed, 16 May 2012 05:46:33 +0000http://changelog.complete.org/?p=7535#comment-10415I noticed this a while back with my content, in the end I just added a line at the top of the rss feed of each article that is a link Pointing to the original page saying this article was originally published here…

If I was really smart I would probably keyword link spam in it, beat the spammers at thirty own game….

]]>By: nobodyhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10414
Wed, 16 May 2012 05:21:03 +0000http://changelog.complete.org/?p=7535#comment-10414check you logfiles, maybe you found overlapping between the ip accessing to your rss and ip or iprange of the contentfarmers … just block them (or even better: deliver most useless content you can imagine)
]]>By: John Goerzenhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10412
Wed, 16 May 2012 04:42:57 +0000http://changelog.complete.org/?p=7535#comment-10412That (not underestimating the stupidity of spammers) is sage advice. I’m going to have to see what Flameeyes is doing with mod_security here too.
]]>By: John Goerzenhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10411
Wed, 16 May 2012 04:41:31 +0000http://changelog.complete.org/?p=7535#comment-10411I’m guessing it’s the page rank, but hard to know…
]]>By: Stevehttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10410
Wed, 16 May 2012 00:55:47 +0000http://changelog.complete.org/?p=7535#comment-10410You could go the route of trying to get content removed from sites, but ultimately that is going to end up in a game of wack-a-mole. I think you would be better off introducing technology to prevent the web scraping in the first place. I’m not an expert in this and don’t have specific suggestions. You will likely have to balance that with the ease of content availability to your legit readers (not unlike the captcha form that I am going to have to fill out to post this message). As to understanding the rationality of this activity and of the email messages, that is probably futile. One thing I learned from this business is to never underestimate the stupidity of spammers…
]]>By: Anonymoushttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10409
Wed, 16 May 2012 00:14:06 +0000http://changelog.complete.org/?p=7535#comment-10409If you can choke back the bad taste it’ll leave you with, DMCA notices work quite well to eliminate copies of your content. Send them to the hosting company, not just to the content farm.
]]>By: Flameeyeshttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10408
Tue, 15 May 2012 23:38:18 +0000http://changelog.complete.org/?p=7535#comment-10408I’d suggest you to just set up ModSecurity with proper antispam rules, I have my own set published at https://github.com/Flameeyes/modsec-flameeyes and it solves a lot of issues of scraping and spammers.
]]>By: kevixhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10407
Tue, 15 May 2012 23:01:12 +0000http://changelog.complete.org/?p=7535#comment-10407http://www.educause.edu/blog/crevier/blockdisplayofyourimagesonothe/164959
that might be one minor way.
]]>By: Ingohttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10406
Tue, 15 May 2012 21:31:21 +0000http://changelog.complete.org/?p=7535#comment-10406Recently I found some of my blog post content (not design) copied on to me unknown websites. WIthout my permission or without even asking me.
Like yours, my blog has very modest traffic (about 8000 views per year).
]]>By: Shae Erissonhttp://changelog.complete.org/archives/7535-suspicious-blog-activity-any-advice/comment-page-1#comment-10404
Tue, 15 May 2012 21:27:43 +0000http://changelog.complete.org/?p=7535#comment-10404Perhaps your blog has a high page rank, and the spammers want to exploit that?
Perhaps the spammers are hoping for a reply to see if your email is real and read?
I’m not sure what else might be going on here.
]]>